Abstract—Errors in critically important systems may become very expensive. If such systems must provide confidentiality when working with some critically im-portant data such as classified information or private know-how, an error cost may become difficult to eval-uate. For these systems, formal verification methods should be used to prove they are error-free. In the paper, a case of formal verification of such system – a Linux kernel security module – is considered; the chosen toolset, the verification process workflow are reviewed, along with some auxiliary tools required for this process and developed by the authors. I
Software is vital for modern society. It is used in many safety- or security-critical applications, ...
The use of formal methods in general, and of deductive formal methods in particular, for the develop...
completed and in this article I’m showing what we have proved and what that means for security. The ...
Abstract—We present the preliminary results of our work on designing an automatic toolset for verifi...
There is increasing pressure on providing a high degree of assurance of operation system’s security ...
Case studies for formal software verification can be divided into two categories: while (i) unsound ...
Software has become an integral part of our everyday lives, and so is our reliance on his correct fu...
Abstract We apply state-of-the art deductive verification tools to check security-relevant propertie...
Abstract:- Secure communications over insecure networks relies on the security of cryptographic prot...
Digital signatures have been proposed by several researchers as a way of preventing execution of mal...
International audienceIn this paper, we will present the current state of the art around the topic o...
The use of formal methods in general, and of deductive formal methods in particular, for the develop...
In the first part of this thesis, we present a case study on successfully verifying the Linux USB BP...
Formal verification of the Linux kernel has been receiving increasing attention in recent years, wit...
In our increasingly computer-oriented society, the computer programs we rely on tend to increase in ...
Software is vital for modern society. It is used in many safety- or security-critical applications, ...
The use of formal methods in general, and of deductive formal methods in particular, for the develop...
completed and in this article I’m showing what we have proved and what that means for security. The ...
Abstract—We present the preliminary results of our work on designing an automatic toolset for verifi...
There is increasing pressure on providing a high degree of assurance of operation system’s security ...
Case studies for formal software verification can be divided into two categories: while (i) unsound ...
Software has become an integral part of our everyday lives, and so is our reliance on his correct fu...
Abstract We apply state-of-the art deductive verification tools to check security-relevant propertie...
Abstract:- Secure communications over insecure networks relies on the security of cryptographic prot...
Digital signatures have been proposed by several researchers as a way of preventing execution of mal...
International audienceIn this paper, we will present the current state of the art around the topic o...
The use of formal methods in general, and of deductive formal methods in particular, for the develop...
In the first part of this thesis, we present a case study on successfully verifying the Linux USB BP...
Formal verification of the Linux kernel has been receiving increasing attention in recent years, wit...
In our increasingly computer-oriented society, the computer programs we rely on tend to increase in ...
Software is vital for modern society. It is used in many safety- or security-critical applications, ...
The use of formal methods in general, and of deductive formal methods in particular, for the develop...
completed and in this article I’m showing what we have proved and what that means for security. The ...